General

  • Target

    ceec3774248764e214a66b1abda4fb50983864530133b0bd7af88768827423f1

  • Size

    726KB

  • Sample

    241105-f7tyvavhre

  • MD5

    58435f451bf2535309b1101a25192fc6

  • SHA1

    feee4908810d8fc599991f8f9ba7e93f3c265a5b

  • SHA256

    ceec3774248764e214a66b1abda4fb50983864530133b0bd7af88768827423f1

  • SHA512

    701842c706a3a39202ed9c30cf549b302ff89209d4205e1455dc71060102f7cc51f7f34af37f3513306e80d114d1a2d4fd5746c51ead233d46428e6fd8ace083

  • SSDEEP

    12288:RMr3y906S1ndZDk04eaOMAXs9v9TQl2xzDLRjvhTIqvBB7d7iRTo63BdIhqGe:GyzS1dZDkv8dshXxzDZpTIEBBRiRTN35

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      ceec3774248764e214a66b1abda4fb50983864530133b0bd7af88768827423f1

    • Size

      726KB

    • MD5

      58435f451bf2535309b1101a25192fc6

    • SHA1

      feee4908810d8fc599991f8f9ba7e93f3c265a5b

    • SHA256

      ceec3774248764e214a66b1abda4fb50983864530133b0bd7af88768827423f1

    • SHA512

      701842c706a3a39202ed9c30cf549b302ff89209d4205e1455dc71060102f7cc51f7f34af37f3513306e80d114d1a2d4fd5746c51ead233d46428e6fd8ace083

    • SSDEEP

      12288:RMr3y906S1ndZDk04eaOMAXs9v9TQl2xzDLRjvhTIqvBB7d7iRTo63BdIhqGe:GyzS1dZDkv8dshXxzDZpTIEBBRiRTN35

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks